About Scott Jackisch

Phishing is the attempt to acquire sensitive information, such as: usernames, passwords, and credit card details, often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.
– Wikipedia (https://en.wikipedia.org/wiki/Phishing)

At Aviator IT, we’ve seen phishing attacks on our clients for years, and, recently, they seem to have gotten more devilishly clever. The FBI […]

A client of ours recently got an email from a security consulting firm that contained the username and password he uses for multiple websites. This email explained that they had found his credentials in an online dump of passwords from a compromised website, and they were offering their consulting services to help him tighten […]

We work with a biotech company in the Bay Area that recently spun off a subsidiary to merge with an East Coast company. Politics being what they were, the East Coast firm wanted to stick with their existing IT vendor. We had some calls and it seemed that their philosophy was compatible with ours, so […]

We have seen cloud services become a greater and greater part of our consulting practice over the years, so we know that they appeal to our clients, but we are always curious about why businesses are switching to the cloud. We recently came across a cloud survey […]